Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked Ninjutsu OS v3 - Penetration testing/Red Teaming distribution based on Windows


itsMe

Recommended Posts

This is the hidden content, please

Ninjutsu-OS is a dedicated Windows 10 OS (Build 1909) that contains more than 800 cybersecurity testing tools. Kali Linux, just from the Windows world. The release is quite fresh, took place on 18.04.2020.

The INSTALLATION of the OS itself is no different from the standard Win 10 installation, except that it is noticeably longer.

This is the hidden content, please

After the OS itself is launched, it will take about 10 minutes to install and customize everything. After all the manipulations we are met with a slightly overloaded (in my opinion) and a very colorful desktop.

This is the hidden content, please

This is the hidden content, please

This is the hidden content, please

This is the hidden content, please

Now let's see what's inside.

In total, more than 800 utilities were included in the assembly. Some of them the author had to adapt to start running under Windows.

At the top is a separate bar, which contains all the utilities by category for speed access. The utility categorization is done with an emphasis on OSCP methodology with an eye to categorization in Kali Linux:
"Mr.Robot tools kit are the most commonly used utilities and other additional materials, according to the author of the assembly. Personal top, so to speak;
" Red Teaming is the most commonly used tool for category testing. In fact, these are all top utilities with all the categories below under one tab;

Information Gathering - gathering information;
"Exploitation Tools is an exploiting vulnerability
Malware analysis
Mobile Security Tools - Mobile Testing
Network Attack - Network Attacks
Password Attacks - password hacking
Proxy and Privacy Tools - proxing and anonymizers;
- Reverse Engineering is a reverse engineering;
Stress Testing - Stress Testing (DDoS);
Vulnerability Analysis - Finding vulnerabilities
Web Application Attack , web pentest;
Wireless Attacks - Wireless Attacks
Fuzzing and payloads - phasing and workloads;
Remote Control Tools - Remote Control
- Utility Tools - other auxiliary utilities (Winrar, MyS'L, etc.);

The full list of available utilities can be found on the project's website. The OS is perfect for both pure pentest and people who are engaged in reverse engineering, OSINT or malware analysis. In a few days of work on the OS, I didn't catch any critical bugs or software failures. Tested on machines with Hack the Box plus turned up an additional project on OSINT.


This is the hidden content, please

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.